R18 B.Tech - .IT Syllabus IV Year
R18 B.Tech - .IT Syllabus IV Year
R18 B.Tech - .IT Syllabus IV Year
I YEAR I SEMESTER
Course
S. No. Course Title L T P Credits
Code
1 MA101BS Mathematics - I 3 1 0 4
2 CH102BS Chemistry 3 1 0 4
3 EE103ES Basic Electrical Engineering 3 0 0 3
4 ME105ES Engineering Workshop 1 0 3 2.5
5 EN105HS English 2 0 0 2
6 CH106BS Engineering Chemistry Lab 0 0 3 1.5
7 EN107HS English Language and Communication Skills Lab 0 0 2 1
8 EE108ES Basic Electrical Engineering Lab 0 0 2 1
Induction Programme
Total Credits 12 2 10 19
I YEAR II SEMESTER
Course
S. No. Course Title L T P Credits
Code
1 MA201BS Mathematics - II 3 1 0 4
2 AP202BS Applied Physics 3 1 0 4
3 CS203ES Programming for Problem Solving 3 1 0 4
4 ME204ES Engineering Graphics 1 0 4 3
5 AP205BS Applied Physics Lab 0 0 3 1.5
6 CS206ES Programming for Problem Solving Lab 0 0 3 1.5
7 *MC209ES Environmental Science 3 0 0 0
Total Credits 13 3 10 18
II YEAR I SEMESTER
Course
S. No. Course Title L T P Credits
Code
1 CS301ES Analog and Digital Electronics 3 0 0 3
2 CS302PC Data Structures 3 1 0 4
3 MA303BS Computer Oriented Statistical Methods 3 1 0 4
4 IT304PC Computer Organization and Microprocessor 3 0 0 3
5 CS305PC Object Oriented Programming using C++ 2 0 0 2
6 CS306ES Analog and Digital Electronics Lab 0 0 2 1
7 CS307PC Data Structures Lab 0 0 3 1.5
8 IT308PC IT Workshop and Microprocessor Lab 0 0 3 1.5
9 CS309PC C++ Programming Lab 0 0 2 1
10 *MC309 Gender Sensitization Lab 0 0 2 0
Total Credits 14 2 12 21
II YEAR II SEMESTER
Course
S. No. Course Title L T P Credits
Code
1 CS401PC Discrete Mathematics 3 0 0 3
1
R18 B.Tech. IT Syllabus JNTU HYDERABAD
IV YEAR I SEMESTER
Course
S. No. Course Title L T P Credits
Code
1 IT701PC Information Security 3 0 0 3
2 CS702PC Data Mining 2 0 0 2
3 Professional Elective -IV 3 0 0 3
4 Professional Elective -V 3 0 0 3
5 Open Elective-II 3 0 0 3
6 IT703PC Information Security Lab 0 0 2 1
7 IT704PC Industrial Oriented Mini Project/ Summer Internship 0 0 0 2*
8 IT705PC Seminar 0 0 2 1
2
R18 B.Tech. IT Syllabus JNTU HYDERABAD
IV YEAR II SEMESTER
Course
S. No. Course Title L T P Credits
Code
1 SM801MS Organizational Behaviour 3 0 0 3
2 Professional Elective -VI 3 0 0 3
3 Open Elective-III 3 0 0 3
4 IT802PC Project Stage - II 0 0 14 7
Total Credits 9 0 14 16
NOTE: Industrial Oriented Mini Project/ Summer Internship is to be carried out during the summer
vacation between 6th and 7th semesters. Students should submit report of Industrial Oriented Mini
Project/ Summer Internship for evaluation.
Professional Elective - I
IT511PE Biometrics
CS512PE Advanced Computer Architecture
CS513PE Data Analytics
CS514PE Image Processing
CS515PE Principles of Programming Languages
Professional Elective - II
CS521PE Computer Graphics
IT521PE Database Security
CS522PE Advanced Operating Systems
IT523PE Machine Learning
IT524PE Pattern Recognition
Professional Elective -V
IT721PE Intrusion Detection Systems
CS722PE Real Time Systems
CS723PE Soft Computing
IT724PE Distributed Databases
CS725PE Software Process & Project Management
3
R18 B.Tech. IT Syllabus JNTU HYDERABAD
4
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Course Objectives:
To understand the fundamentals of Cryptography
To understand various key distribution and management schemes
To understand how to deploy encryption techniques to secure data in transit across data
networks
To apply algorithms used for secure transactions in real world applications
Course Outcomes:
Demonstrate the knowledge of cryptography, network security concepts and applications.
Ability to apply security principles in system design.
UNIT - I
Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services
(Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability) and
Mechanisms, A model for Internetwork security. Classical Encryption Techniques, DES, Strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of operation,
Blowfish, Placement of Encryption Function, Traffic Confidentiality, key Distribution, Random Number
Generation.
UNIT - II
Public key Cryptography Principles, RSA algorithm, Key Management, Diffie-Hellman Key Exchange,
Elliptic Curve Cryptography. Message authentication and Hash Functions, Authentication
Requirements and Functions, Message Authentication, Hash Functions and MACs Hash and MAC
Algorithms SHA-512, HMAC.
UNIT - III
Digital Signatures, Authentication Protocols, Digital signature Standard, Authentication Applications,
Kerberos, X.509 Directory Authentication Service. Email Security: Pretty Good Privacy (PGP) and
S/MIME.
UNIT - IV
IP Security: Overview, IP Security Architecture, Authentication Header, Encapsulating Security
Payload, Combining Security Associations and Key Management.
Web Security: Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security
(TLS), Secure Electronic Transaction (SET).
UNIT - V
Intruders, Viruses and Worms Intruders, Viruses and related threats Firewalls: Firewall Design
Principles, Trusted Systems, Intrusion Detection Systems.
TEXT BOOK:
1. Cryptography and Network Security (principles and approaches) by William Stallings Pearson
Education, 4th Edition.
REFERENCE BOOKS:
1. Network Security Essentials (Applications and Standards) by William Stallings Pearson
Education.
2. Principles of Information Security, Whitman, Thomson.
123
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Course Outcomes:
Ability to understand the types of the data to be mined and present a general classification of
tasks and primitives to integrate a data mining system.
Apply preprocessing methods for any given raw data.
Extract interesting patterns from large amounts of data.
Discover the role played by data mining in various fields.
Choose and employ suitable data mining algorithms to build analytical applications
Evaluate the accuracy of supervised and unsupervised models and algorithms.
UNIT – I
Data Mining: Data–Types of Data–, Data Mining Functionalities– Interestingness Patterns–
Classification of Data Mining systems– Data mining Task primitives –Integration of Data mining system
with a Data warehouse–Major issues in Data Mining–Data Preprocessing.
UNIT – II
Association Rule Mining: Mining Frequent Patterns–Associations and correlations – Mining
Methods– Mining Various kinds of Association Rules– Correlation Analysis– Constraint based
Association mining. Graph Pattern Mining, SPM.
UNIT – III
Classification: Classification and Prediction – Basic concepts–Decision tree induction–Bayesian
classification, Rule–based classification, Lazy learner.
UNIT – IV
Clustering and Applications: Cluster analysis–Types of Data in Cluster Analysis–Categorization of
Major Clustering Methods– Partitioning Methods, Hierarchical Methods– Density–Based Methods,
Grid–Based Methods, Outlier Analysis.
UNIT – V
Advanced Concepts: Basic concepts in Mining data streams–Mining Time–series data––Mining
sequence patterns in Transactional databases– Mining Object– Spatial– Multimedia–Text and Web
data – Spatial Data mining– Multimedia Data mining–Text Mining– Mining the World Wide Web.
TEXT BOOKS:
1. Data Mining – Concepts and Techniques – Jiawei Han & Micheline Kamber, 3rd Edition Elsevier.
2. Data Mining Introductory and Advanced topics – Margaret H Dunham, PEA.
REFERENCE BOOK:
1. Ian H. Witten and Eibe Frank, Data Mining: Practical Machine Learning Tools and Techniques
(Second Edition), Morgan Kaufmann, 2005.
124
R18 B.Tech. IT Syllabus JNTU HYDERABAD
UNIT - I
The Web Security, The Web Security Problem, Risk Analysis and Best Practices
Cryptography and the Web: Cryptography and Web Security, Working Cryptographic Systems and
Protocols, Legal Restrictions on Cryptography, Digital Identification
UNIT - II
The Web’s War on Your Privacy, Privacy-Protecting Techniques, Backups and Antitheft, Web Server
Security, Physical Security for Servers, Host Security for Servers, Securing Web Applications
UNIT - III
Database Security: Recent Advances in Access Control, Access Control Models for XML, Database
Issues in Trust Management and Trust Negotiation, Security in Data Warehouses and OLAP Systems
UNIT - IV
Security Re-engineering for Databases: Concepts and Techniques, Database Watermarking for
Copyright Protection, Trustworthy Records Retention, Damage Quarantine and Recovery in Data
Processing Systems, Hippocratic Databases: Current Capabilities and
UNIT - V
Future Trends Privacy in Database Publishing: A Bayesian Perspective, Privacy-enhanced Location-
based Access Control, Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment
TEXT BOOK:
1. Web Security, Privacy and Commerce Simson G Arfinkel, Gene Spafford, O’Reilly.
2. Handbook on Database security applications and trends Michael Gertz, Sushil Jajodia
125
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Course Objectives:
To Improve the system performance
To learn various distributed and parallel computing architecture
To learn different computing technologies
Course Outcomes:
Understanding the concepts in grid computing
Ability to set up cluster and run parallel applications
Ability to understand the cluster projects and cluster OS
Understanding the concepts of pervasive computing & quantum computing.
UNIT - I
Grid Computing: Data & Computational Grids, Grid Architectures And Its Relations To Various
Distributed Technologies. Autonomic Computing, Examples Of The Grid Computing Efforts (Ibm).
UNIT - II
Cluster Setup & Its Advantages, Performance Models & Simulations; Networking Protocols & I/O,
Messaging Systems. Process Scheduling, Load Sharing And Balancing; Distributed Shared Memory,
Parallel I/O.
UNIT - III:
Example Cluster System – Beowlf; Cluster Operating Systems: Compas And Nanos
Pervasive Computing Concepts & Scenarios; Hardware & Software; Human – Machine Interface.
UNIT- IV
Device Connectivity; Java for Pervasive Devices; Application Examples.
UNIT - V
Classical Vs Quantum Logic Gates; One, Two & Three Qubit Quantum Gates; Fredkin & Toffoli
Gates; Quantum Circuits; Quantum Algorithms.
TEXT BOOK:
1. “Selected Topics In Advanced Computing” Edited By Dr. P. Padmanabham And Dr. M.B.
Srinivas, 2005 Pearson Education.
REFERENCE BOOKS:
1. J. Joseph & C. Fellenstien: ‘Grid Computing ‘, Pearson Education
2. J. Burkhardt et.al: ‘pervasive computing’ Pearson Education
3. Marivesar:’ Approaching quantum computing’, Pearson Education.
4. Raj kumar Buyya:’High performance cluster computing’, Pearson Education.
5. Neilsen & Chung L:’ Quantum computing and Quantum Information’, Cambridge University
Press.
6. A networking approach to Grid Computing, Minoli, Wiley
126
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Course Objectives:
To learn the distinction between optimal reasoning Vs. human like reasoning
To understand the concepts of state space representation, exhaustive search, heuristic search
together with the time and space complexities.
To learn different knowledge representation techniques.
To understand the applications of AI, namely game playing, theorem proving, and machine
learning.
Course Outcomes:
Ability to formulate an efficient problem space for a problem expressed in natural language.
Select a search algorithm for a problem and estimate its time and space complexities.
Possess the skill for representing knowledge using the appropriate technique for a given
problem.
Possess the ability to apply AI techniques to solve problems of game playing, and machine
learning.
UNIT - I
Problem Solving by Search-I: Introduction to AI, Intelligent Agents
Problem Solving by Search –II: Problem-Solving Agents, Searching for Solutions, Uninformed Search
Strategies: Breadth-first search, Uniform cost search, Depth-first search, Iterative deepening Depth-first
search, Bidirectional search, Informed (Heuristic) Search Strategies: Greedy best-first search, A*
search, Heuristic Functions, Beyond Classical Search: Hill-climbing search, Simulated annealing
search, Local Search in Continuous Spaces, Searching with Non-Deterministic Actions, Searching wih
Partial Observations, Online Search Agents and Unknown Environment .
UNIT - II
Problem Solving by Search-II and Propositional Logic
Adversarial Search: Games, Optimal Decisions in Games, Alpha–Beta Pruning, Imperfect Real-Time
Decisions.
Constraint Satisfaction Problems: Defining Constraint Satisfaction Problems, Constraint
Propagation, Backtracking Search for CSPs, Local Search for CSPs, The Structure of Problems.
Propositional Logic: Knowledge-Based Agents, The Wumpus World, Logic, Propositional Logic,
Propositional Theorem Proving: Inference and proofs, Proof by resolution, Horn clauses and definite
clauses, Forward and backward chaining, Effective Propositional Model Checking, Agents Based on
Propositional Logic.
UNIT - III
Logic and Knowledge Representation
First-Order Logic: Representation, Syntax and Semantics of First-Order Logic, Using First-Order
Logic, Knowledge Engineering in First-Order Logic.
127
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Inference in First-Order Logic: Propositional vs. First-Order Inference, Unification and Lifting,
Forward Chaining, Backward Chaining, Resolution.
Knowledge Representation: Ontological Engineering, Categories and Objects, Events. Mental Events
and Mental Objects, Reasoning Systems for Categories, Reasoning with Default Information.
UNIT - IV
Planning
Classical Planning: Definition of Classical Planning, Algorithms for Planning with State-Space Search,
Planning Graphs, other Classical Planning Approaches, Analysis of Planning approaches.
Planning and Acting in the Real World: Time, Schedules, and Resources, Hierarchical Planning,
Planning and Acting in Nondeterministic Domains, Multi agent Planning.
UNIT - V
Uncertain knowledge and Learning
Uncertainty: Acting under Uncertainty, Basic Probability Notation, Inference Using Full Joint
Distributions, Independence, Bayes’ Rule and Its Use,
Probabilistic Reasoning: Representing Knowledge in an Uncertain Domain, The Semantics of
Bayesian Networks, Efficient Representation of Conditional Distributions, Approximate Inference in
Bayesian Networks, Relational and First-Order Probability, Other Approaches to Uncertain Reasoning;
Dempster-Shafer theory.
Learning: Forms of Learning, Supervised Learning, Learning Decision Trees. Knowledge in Learning:
Logical Formulation of Learning, Knowledge in Learning, Explanation-Based Learning, Learning Using
Relevance Information, Inductive Logic Programming.
TEXT BOOK:
1. Artificial Intelligence A Modern Approach, Third Edition, Stuart Russell and Peter Norvig,
Pearson Education.
REFERENCE BOOKS:
1. Artificial Intelligence, 3rd Edn, E. Rich and K. Knight (TMH)
2. Artificial Intelligence, 3rd Edn., Patrick Henny Winston, Pearson Education.
3. Artificial Intelligence, Shivani Goel, Pearson Education.
4. Artificial Intelligence and Expert systems – Patterson, Pearson Education.
128
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Course Objectives:
This course provides an insight into cloud computing
Topics covered include- distributed system models, different cloud service models, service-
oriented architectures, cloud programming and software environments, resource management.
Course Outcomes:
Ability to understand various service delivery models of a cloud computing architecture.
Ability to understand the ways in which the cloud can be programmed and deployed.
Understanding cloud service providers.
UNIT - I
Computing Paradigms: High-Performance Computing, Parallel Computing, Distributed Computing,
Cluster Computing, Grid Computing, Cloud Computing, Bio computing, Mobile Computing, Quantum
Computing, Optical Computing, Nano computing.
UNIT - II
Cloud Computing Fundamentals: Motivation for Cloud Computing, The Need for Cloud Computing,
Defining Cloud Computing, Definition of Cloud computing, Cloud Computing Is a Service, Cloud
Computing Is a Platform, Principles of Cloud computing, Five Essential Characteristics, Four Cloud
Deployment Models
UNIT - III
Cloud Computing Architecture and Management: Cloud architecture, Layer, Anatomy of the Cloud,
Network Connectivity in Cloud Computing, Applications, on the Cloud, Managing the Cloud, Managing
the Cloud Infrastructure Managing the Cloud application, Migrating Application to Cloud, Phases of
Cloud Migration Approaches for Cloud Migration.
UNIT - IV
Cloud Service Models: Infrastructure as a Service, Characteristics of IaaS. Suitability of IaaS, Pros
and Cons of IaaS, Summary of IaaS Providers, Platform as a Service, Characteristics of PaaS,
Suitability of PaaS, Pros and Cons of PaaS, Summary of PaaS Providers, Software as a Service,
Characteristics of SaaS, Suitability of SaaS, Pros and Cons of SaaS, Summary of SaaS Providers,
Other Cloud Service Models.
UNIT - V
Cloud Service Providers: EMC, EMC IT, Captiva Cloud Toolkit, Google, Cloud Platform, Cloud
Storage, Google Cloud Connect, Google Cloud Print, Google App Engine, Amazon Web Services,
Amazon Elastic Compute Cloud, Amazon Simple Storage Service, Amazon Simple Queue ,service,
Microsoft, Windows Azure, Microsoft Assessment and Planning Toolkit, SharePoint, IBM, Cloud
Models, IBM Smart Cloud, SAP Labs, SAP HANA Cloud Platform, Virtualization Services Provided by
SAP, Sales force, Sales Cloud, Service Cloud: Knowledge as a Service, Rack space, VMware, Manjra
soft, Aneka Platform
129
R18 B.Tech. IT Syllabus JNTU HYDERABAD
TEXT BOOK:
1. Essentials of cloud Computing: K. Chandrasekhran, CRC press, 2014
REFERENCE BOOKS:
1. Cloud Computing: Principles and Paradigms by Rajkumar Buyya, James Broberg and Andrzej
M. Goscinski, Wiley, 2011.
2. Distributed and Cloud Computing, Kai Hwang, Geoffery C. Fox, Jack J. Dongarra, Elsevier,
2012.
3. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, Tim Mather,
Subra Kumaraswamy, Shahed Latif, O’Reilly, SPD, rp 2011.
130
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Course Objectives:
To understand the concepts of sensor networks
To understand the MAC and transport protocols for ad hoc networks
To understand the security of sensor networks
To understand the applications of adhoc and sensor networks
Course Outcomes:
Ability to understand the state-of-the-art research in the emerging subject of Ad Hoc and
Wireless Sensor Networks
Ability to solve the issues in real-time application development based on ASN.
Ability to conduct further research in the domain of ASN
UNIT - I
Introduction to Ad Hoc Networks - Characteristics of MANETs, Applications of MANETs and
Challenges of MANETs.
Routing in MANETs - Criteria for classification, Taxonomy of MANET routing algorithms, Topology-
based routing algorithms-Proactive: DSDV; Reactive: DSR, AODV; Hybrid: ZRP; Position-based
routing algorithms-Location Services-DREAM, Quorum-based; Forwarding Strategies: Greedy
Packet, Restricted Directional Flooding-DREAM, LAR.
UNIT - II
Data Transmission - Broadcast Storm Problem, Rebroadcasting Schemes-Simple-flooding,
Probability-based Methods, Area-based Methods, Neighbor Knowledge-based: SBA, Multipoint
Relaying, AHBP. Multicasting: Tree-based: AMRIS, MAODV; Mesh-based: ODMRP, CAMP;
Hybrid: AMRoute, MCEDAR.
UNIT - III
Geocasting: Data-transmission Oriented-LBM; Route Creation Oriented-GeoTORA, MGR.
TCP over Ad Hoc TCP protocol overview, TCP and MANETs, Solutions for TCP over Ad hoc
UNIT - IV
Basics of Wireless, Sensors and Lower Layer Issues: Applications, Classification of sensor
networks, Architecture of sensor network, Physical layer, MAC layer, Link layer, Routing Layer.
UNIT - V
Upper Layer Issues of WSN: Transport layer, High-level application layer support, Adapting to the
inherent dynamic nature of WSNs, Sensor Networks and mobile robots.
TEXT BOOKS:
1. Ad Hoc and Sensor Networks – Theory and Applications, Carlos Corderio Dharma P. Aggarwal,
World Scientific Publications, March 2006, ISBN – 981–256–681–3.
2. Wireless Sensor Networks: An Information Processing Approach, Feng Zhao, Leonidas
Guibas, Elsevier Science, ISBN – 978-1-55860-914-3 (Morgan Kauffman).
131
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Course Objectives:
Compare alternative tools and approaches for Intrusion Detection through quantitative analysis
to determine the best tool or approach to reduce risk from intrusion.
Identify and describe the parts of all intrusion detection systems and characterize new and
emerging IDS technologies according to the basic capabilities all intrusion detection systems
share.
Course Outcomes: After completion of the course, students will be able to:
Possess a fundamental knowledge of Cyber Security.
Understand what vulnerability is and how to address most common vulnerabilities.
Know basic and fundamental risk management principles as it relates to Cyber Security and
Mobile Computing.
Have the knowledge needed to practice safer computing and safeguard your information using
Digital Forensics.
Understand basic technical controls in use today, such as firewalls and Intrusion Detection
systems.
Understand legal perspectives of Cyber Crimes and Cyber Security.
UNIT - I
The state of threats against computers, and networked systems-Overview of computer security
solutions and why they fail-Vulnerability assessment, firewalls, VPN’s -Overview of Intrusion Detection
and Intrusion Prevention, Network and Host-based IDS
UNIT - II
Classes of attacks - Network layer: scans, denial of service, penetration Application layer: software
exploits, code injection-Human layer: identity theft, root access-Classes of attackers-Kids/hackers/sop
Hesitated groups-Automated: Drones, Worms, Viruses
UNIT - III
A General IDS model and taxonomy, Signature-based Solutions, Snort, Snort rules, Evaluation of IDS,
Cost sensitive IDS
UNIT - IV
Anomaly Detection Systems and Algorithms-Network Behaviour Based Anomaly Detectors (rate
based)-Host-based Anomaly Detectors-Software Vulnerabilities-State transition, Immunology, Payload
Anomaly Detection
UNIT - V
Attack trees and Correlation of alerts- Autopsy of Worms and Botnets-Malware detection -Obfuscation,
polymorphism- Document vectors.
Email/IM security issues-Viruses/Spam-From signatures to thumbprints to zero day detection-Insider
Threat issues-Taxonomy-Masquerade and Impersonation Traitors, Decoys and Deception-Future:
Collaborative Security
132
R18 B.Tech. IT Syllabus JNTU HYDERABAD
TEXT BOOKS:
1. Peter Szor, The Art of Computer Virus Research and Defense, Symantec Press ISBN 0-321-
30545-3.
2. Markus Jakobsson and Zulfikar Ramzan, Crimeware, Understanding New Attacks and
Defenses.
REFERENCE BOOKS:
1. Saiful Hasan, Intrusion Detection System, Kindle Edition.
2. Ankit Fadia, Intrusion Alert: An Ethical Hacking Guide to Intrusion Detection.
Online Websites/Materials:
1. https://www.intechopen.com/books/intrusion-detection-systems/
Online Courses:
1. https://www.sans.org/course/intrusion-detection-in-depth
2. https://www.cybrary.it/skill-certification-course/ids-ips-certification-training-course
133
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Course Objectives:
To provide broad understanding of the requirements of Real Time Operating Systems.
To make the student understand, applications of these Real Time features using case
studies.
Course Outcomes:
Be able to explain real-time concepts such as preemptive multitasking, task priorities, priority
inversions, mutual exclusion, context switching, and synchronization, interrupt latency and
response time, and semaphores.
Able describe how a real-time operating system kernel is implemented.
Able explain how tasks are managed.
Explain how the real-time operating system implements time management.
Discuss how tasks can communicate using semaphores, mailboxes, and queues.
Be able to implement a real-time system on an embedded processor.
Be able to work with real time operating systems like RT Linux, Vx Works, MicroC /OSII, Tiny
Os
UNIT – I
Introduction: Introduction to UNIX/LINUX, Overview of Commands, File I/O,( open, create, close,
lseek, read, write), Process Control ( fork, vfork, exit, wait, waitpid, exec).
UNIT - II
Real Time Operating Systems: Brief History of OS, Defining RTOS, The Scheduler, Objects, Services,
Characteristics of RTOS, Defining a Task, asks States and Scheduling, Task Operations, Structure,
Synchronization, Communication and Concurrency. Defining Semaphores, Operations and Use,
Defining Message Queue, States, Content, Storage, Operations and Use
UNIT - III
Objects, Services and I/O: Pipes, Event Registers, Signals, Other Building Blocks, Component
Configuration, Basic I/O Concepts, I/O Subsystem
UNIT - IV
Exceptions, Interrupts and Timers: Exceptions, Interrupts, Applications, Processing of Exceptions
and Spurious Interrupts, Real Time Clocks, Programmable Timers, Timer Interrupt Service Routines
(ISR), Soft Timers, Operations.
UNIT - V
Case Studies of RTOS: RT Linux, MicroC/OS-II, Vx Works, Embedded Linux, and Tiny OS.
TEXT BOOK:
1. Real Time Concepts for Embedded Systems – Qing Li, Elsevier, 2011
REFERENCE BOOKS:
1. Embedded Systems- Architecture, Programming and Design by Rajkamal, 2007, TMH.
2. Advanced UNIX Programming, Richard Stevens
3. Embedded Linux: Hardware, Software and Interfacing – Dr. Craig Hollabaugh
134
R18 B.Tech. IT Syllabus JNTU HYDERABAD
UNIT - I
Introduction to Soft Computing: Evolutionary Computing, "Soft" computing versus "Hard" computing,
Soft Computing Methods, Recent Trends in Soft Computing, Characteristics of Soft computing,
Applications of Soft Computing Techniques.
UNIT -II
Fuzzy Systems: Fuzzy Sets, Fuzzy Relations, Fuzzy Logic, Fuzzy Rule-Based Systems
UNIT -III
Fuzzy Decision Making, Particle Swarm Optimization
UNIT -IV
Genetic Algorithms: Basic Concepts, Basic Operators for Genetic Algorithms, Crossover and Mutation
Properties, Genetic Algorithm Cycle, Fitness Function, Applications of Genetic Algorithm.
UNIT -V
Rough Sets, Rough Sets, Rule Induction, and Discernibility Matrix, Integration of Soft Computing
Techniques.
TEXT BOOK:
1. Soft Computing – Advances and Applications - Jan 2015 by B.K. Tripathy and J. Anuradha –
Cengage Learning
REFERENCE BOOKS:
1. S. N. Sivanandam & S. N. Deepa, “Principles of Soft Computing”, 2nd edition, Wiley India, 2008.
2. David E. Goldberg, “Genetic Algorithms-In Search, optimization and Machine learning”,
Pearson Education.
3. J. S. R. Jang, C.T. Sun and E.Mizutani, “Neuro-Fuzzy and Soft Computing”, Pearson
Education, 2004.
4. G.J. Klir & B. Yuan, “Fuzzy Sets & Fuzzy Logic”, PHI, 1995.
5. Melanie Mitchell, “An Introduction to Genetic Algorithm”, PHI, 1998.
6. Timothy J. Ross, “Fuzzy Logic with Engineering Applications”, McGraw- Hill International
editions, 1995
135
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Course Objectives:
The purpose of the course is to enrich the previous knowledge of database systems and
exposing the need for distributed database technology to confront with the deficiencies of the
centralized database systems.
Introduce basic principles and implementation techniques of distributed database systems.
Equip students with principles and knowledge of parallel and object-oriented databases.
Topics include distributed DBMS architecture and design; query processing and optimization;
distributed transaction management and reliability; parallel and object database management
systems.
Course Outcomes:
Understand theoretical and practical aspects of distributed database systems.
Study and identify various issues related to the development of distributed database system.
Understand the design aspects of object-oriented database system and related development.
UNIT - I
Introduction; Distributed Data Processing, Distributed Database System, Promises of DDBSs,
Problem areas.
Distributed DBMS Architecture: Architectural Models for Distributed DBMS, DDMBS Architecture.
Distributed Database Design: Alternative Design Strategies, Distribution Design issues,
Fragmentation, Allocation.
UNIT - II
Query processing and decomposition: Query processing objectives, characterization of query
processors, layers of query processing, query decomposition, localization of distributed data.
Distributed query Optimization: Query optimization, centralized query optimization, distributed query
optimization algorithms.
UNIT - III
Transaction Management: Definition, properties of transaction, types of transactions, distributed
concurrency control: serializability, concurrency control mechanisms & algorithms, time - stamped &
optimistic concurrency control Algorithms, deadlock Management.
UNIT - IV
Distributed DBMS Reliability: Reliability concepts and measures, fault-tolerance in distributed
systems, failures in Distributed DBMS, local & distributed reliability protocols, site failures and network
partitioning.
Parallel Database Systems: Parallel database system architectures, parallel data placement, parallel
query processing, load balancing, database clusters.
UNIT - V
Distributed object Database Management Systems: Fundamental object concepts and models,
object distributed design, architectural issues, object management, distributed object storage, object
query Processing.
136
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Object Oriented Data Model: Inheritance, object identity, persistent programming languages,
persistence of objects, comparison OODBMS and ORDBMS
TEXT BOOKS:
1. M. Tamer OZSU and Patuck Valduriez: Principles of Distributed Database Systems, Pearson
Edn. Asia, 2001.
2. Stefano Ceri and Giuseppe Pelagatti: Distributed Databases, McGraw Hill.
REFERENCE BOOK:
1. Hector Garcia-Molina, Jeffrey D. Ullman, Jennifer Widom: “Database Systems: The Complete
Book”, Second Edition, Pearson International Edition
137
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Course Outcomes:
Gain knowledge of software economics, phases in the life cycle of software development,
project organization, project control and process instrumentation
Analyze the major and minor milestones, artifacts and metrics from management and technical
perspective
Design and develop software product using conventional and modern principles of software
project management
UNIT - I
Software Process Maturity
Software maturity Framework, Principles of Software Process Change, Software Process Assessment,
The Initial Process, The Repeatable Process, The Defined Process, The Managed Process, The
Optimizing Process.
Process Reference Models
Capability Maturity Model (CMM), CMMI, PCMM, PSP, TSP).
UNIT - II
Software Project Management Renaissance
Conventional Software Management, Evolution of Software Economics, Improving Software
Economics, The old way and the new way.
Life-Cycle Phases and Process artifacts
Engineering and Production stages, inception phase, elaboration phase, construction phase, transition
phase, artifact sets, management artifacts, engineering artifacts and pragmatic artifacts, model-based
software architectures.
UNIT - III
Workflows and Checkpoints of process
Software process workflows, Iteration workflows, Major milestones, minor milestones, periodic status
assessments.
Process Planning
Work breakdown structures, Planning guidelines, cost and schedule estimating process, iteration
planning process, Pragmatic planning.
UNIT - IV
Project Organizations
Line-of- business organizations, project organizations, evolution of organizations, process automation.
Project Control and process instrumentation
The seven-core metrics, management indicators, quality indicators, life-cycle expectations, Pragmatic
software metrics, metrics automation.
UNIT - V
CCPDS-R Case Study and Future Software Project Management Practices
Modern Project Profiles, Next-Generation software Economics, Modern Process Transitions.
138
R18 B.Tech. IT Syllabus JNTU HYDERABAD
TEXT BOOKS:
1. Managing the Software Process, Watts S. Humphrey, Pearson Education
2. Software Project Management, Walker Royce, Pearson Education
REFERENCE BOOKS:
1. An Introduction to the Team Software Process, Watts S. Humphrey, Pearson Education, 2000
2. Process Improvement essentials, James R. Persse, O’Reilly, 2006
3. Software Project Management, Bob Hughes & Mike Cotterell, fourth edition, TMH, 2006
4. Applied Software Project Management, Andrew Stellman & Jennifer Greene, O’Reilly, 2006.
5. Head First PMP, Jennifer Greene & Andrew Stellman, O’Reilly, 2007
6. Software Engineering Project Management, Richard H. Thayer & Edward Yourdon,
2nd edition, Wiley India, 2004.
7. Agile Project Management, Jim Highsmith, Pearson education, 2004.
139
R18 B.Tech. IT Syllabus JNTU HYDERABAD
List of Experiments:
1. Write a C program that contains a string (char pointer) with a value ‘Hello world’. The program
should XOR each character in this string with 0 and displays the result.
2. Write a C program that contains a string (char pointer) with a value ‘Hello world’. The program
should AND or and XOR each character in this string with 127 and display the result.
3. Write a Java program to perform encryption and decryption using the following algorithms
a. Ceaser cipher b. Substitution cipher c. Hill Cipher
7. Write the RC4 logic in Java Using Java cryptography; encrypt the text “Hello world” using
Blowfish. Create your own key using Java key tool.
9. Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript.
10. Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
11. Calculate the message digest of a text using the MD5 algorithm in JAVA.
140
R18 B.Tech. IT Syllabus JNTU HYDERABAD
UNIT - I:
Introduction to OB - Definition, Nature and Scope – Environmental and organizational context – Impact
of IT, globalization, Diversity, Ethics, culture, reward systems and organizational design on
Organizational Behaviour. Cognitive Processes-I: Perception and Attribution: Nature and importance of
Perception – Perceptual selectivity and organization – Social perception – Attribution Theories – Locus
of control –Attribution Errors –Impression Management.
UNIT- II:
Cognitive Processes-II: Personality and Attitudes – Personality as a continuum – Meaning of personality
- Johari Window and Transactional Analysis - Nature and Dimension of Attitudes – Job satisfaction and
organizational commitment-Motivational needs and processes- Work-Motivation Approaches Theories
of Motivation- Motivation across cultures - Positive organizational behaviour: Optimism – Emotional
intelligence – Self-Efficacy.
UNIT - III:
Dynamics of OB-I: Communication – types – interactive communication in organizations – barriers to
communication and strategies to improve the follow of communication - Decision Making: Participative
decision-making techniques – creativity and group decision making. Dynamics of OB –II Stress and
Conflict: Meaning and types of stress –Meaning and types of conflict - Effect of stress and intra-
individual conflict - strategies to cope with stress and conflict.
UNIT - IV:
Dynamics of OB –III Power and Politics: Meaning and types of power – empowerment - Groups Vs.
Teams – Nature of groups – dynamics of informal groups – dysfunctions of groups and teams – teams
in modern work place.
UNIT - V:
Leading High performance: Job design and Goal setting for High performance- Quality of Work Life-
Socio technical Design and High-performance work practices - Behavioural performance management:
reinforcement and punishment as principles of Learning –Process of Behavioural modification -
Leadership theories - Styles, Activities and skills of Great leaders.
REFERENCE BOOKS:
1. Luthans, Fred: Organizational Behaviour 10/e, McGraw-Hill, 2009
2. McShane: Organizational Behaviour, 3e, TMH, 2008
3. Nelson: Organizational Behaviour, 3/e, Thomson, 2008.
4. Newstrom W. John & Davis Keith, Organisational Behaviour-- Human Behaviour at Work, 12/e,
TMH, New Delhi, 2009.
5. Pierce and Gardner: Management and Organisational Behaviour: An Integrated perspective,
Thomson, 2009.
6. Robbins, P. Stephen, Timothy A. Judge: Organisational Behaviour, 12/e, PHI/Pearson, New
Delhi, 2009.
7. Pareek Udai: Behavioural Process at Work: Oxford & IBH, New Delhi, 2009.
8. Schermerhorn: Organizational Behaviour 9/e, Wiley, 2008.
9. Hitt: Organizational Behaviour, Wiley, 2008
141
R18 B.Tech. IT Syllabus JNTU HYDERABAD
142
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Course Objectives:
Introduce to some of the problems and solutions of NLP and their relation to linguistics and
statistics.
Course Outcomes:
Show sensitivity to linguistic phenomena and an ability to model them with formal grammars.
Understand and carry out proper experimental methodology for training and evaluating
empirical NLP systems
Able to manipulate probabilities, construct statistical models over strings and trees, and
estimate parameters using supervised and unsupervised training methods.
Able to design, implement, and analyze NLP algorithms
Able to design different language modeling Techniques.
UNIT - I
Finding the Structure of Words: Words and Their Components, Issues and Challenges,
Morphological Models
Finding the Structure of Documents: Introduction, Methods, Complexity of the Approaches,
Performances of the Approaches
UNIT - II
Syntax Analysis: Parsing Natural Language, Treebanks: A Data-Driven Approach to Syntax,
Representation of Syntactic Structure, Parsing Algorithms, Models for Ambiguity Resolution in Parsing,
Multilingual Issues
UNIT - III
Semantic Parsing: Introduction, Semantic Interpretation, System Paradigms, Word Sense
Systems, Software.
UNIT - IV
Predicate-Argument Structure, Meaning Representation Systems, Software.
UNIT - V
Discourse Processing: Cohension, Reference Resolution, Discourse Cohension and Structure
Language Modeling: Introduction, N-Gram Models, Language Model Evaluation, Parameter
Estimation, Language Model Adaptation, Types of Language Models, Language-Specific Modeling
Problems, Multilingual and Crosslingual Language Modeling
TEXT BOOKS:
1. Multilingual natural Language Processing Applications: From Theory to Practice – Daniel M.
Bikel and Imed Zitouni, Pearson Publication
2. Natural Language Processing and Information Retrieval: Tanvier Siddiqui, U.S. Tiwary
REFERENCE BOOK:
1. Speech and Natural Language Processing - Daniel Jurafsky & James H Martin, Pearson
Publications
143
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Course Objectives:
This course provides an insight into Distributed systems.
Topics include- Peer to Peer Systems, Transactions and Concurrency control, Security and
Distributed shared memory
Course Outcomes:
Ability to understand Transactions and Concurrency control.
Ability to understand Security issues.
Understanding Distributed shared memory.
Ability to design distributed systems for basic level applications.
UNIT - I
Characterization of Distributed Systems-Introduction, Examples of Distributed systems, Resource
sharing and web, challenges, System models -Introduction, Architectural and Fundamental models,
Networking and Internetworking, Interprocess Communication, Distributed objects and Remote
Invocation-Introduction, Communication between distributed objects, RPC, Events and notifications,
Case study-Java RMI.
UNIT - II
Operating System Support- Introduction, OS layer, Protection, Processes and Threads, Communication
and Invocation, Operating system architecture, Distributed File Systems-Introduction, File Service
architecture.
UNIT - III
Peer to Peer Systems–Introduction, Napster and its legacy, Peer to Peer middleware, Routing overlays,
Overlay case studies-Pastry, Tapestry, Application case studies-Squirrel, OceanStore.
Time and Global States-Introduction, Clocks, events and Process states, Synchronizing physical
clocks, logical time and logical clocks, global states, distributed debugging.
Coordination and Agreement-Introduction, Distributed mutual exclusion, Elections, Multicast
communication, consensus and related problems.
UNIT - IV
Transactions and Concurrency Control-Introduction, Transactions, Nested Transactions, Locks,
Optimistic concurrency control, Timestamp ordering. Distributed Transactions-Introduction, Flat and
Nested Distributed Transactions, Atomic commit protocols, Concurrency control in distributed
transactions, Distributed deadlocks, Transaction recovery.
UNIT - V
Replication-Introduction, System model and group communication, Fault tolerant services,
Transactions with replicated data.
Distributed shared memory, Design and Implementation issues, Consistency models.
144
R18 B.Tech. IT Syllabus JNTU HYDERABAD
TEXT BOOKS:
1. Distributed Systems Concepts and Design, G Coulouris, J Dollimore and T Kindberg, Fourth
Edition, Pearson Education.
2. Distributed Systems, S. Ghosh, Chapman & Hall/CRC, Taylor & Francis Group, 2010.
REFERENCE BOOKS:
1. Distributed Systems – Principles and Paradigms, A.S. Tanenbaum and M.V. Steen, Pearson
Education.
2. Distributed Computing, Principles, Algorithms and Systems, Ajay D. Kshemakalyani and
Mukesh Singhal, Cambridge, rp 2010.
145
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Course Outcomes:
Ability to understand the concepts of Neural Networks
Ability to select the Learning Networks in modeling real world systems
Ability to use an efficient algorithm for Deep Models
Ability to apply optimization strategies for large scale applications
UNIT-I
Artificial Neural Networks Introduction, Basic models of ANN, important terminologies, Supervised
Learning Networks, Perceptron Networks, Adaptive Linear Neuron, Back-propagation Network.
Associative Memory Networks. Training Algorithms for pattern association, BAM and Hopfield
Networks.
UNIT-II
Unsupervised Learning Network- Introduction, Fixed Weight Competitive Nets, Maxnet, Hamming
Network, Kohonen Self-Organizing Feature Maps, Learning Vector Quantization, Counter Propagation
Networks, Adaptive Resonance Theory Networks. Special Networks-Introduction to various networks.
UNIT - III
Introduction to Deep Learning, Historical Trends in Deep learning, Deep Feed - forward networks,
Gradient-Based learning, Hidden Units, Architecture Design, Back-Propagation and Other
Differentiation Algorithms
UNIT - IV
Regularization for Deep Learning: Parameter norm Penalties, Norm Penalties as Constrained
Optimization, Regularization and Under-Constrained Problems, Dataset Augmentation, Noise
Robustness, Semi-Supervised learning, Multi-task learning, Early Stopping, Parameter Typing and
Parameter Sharing, Sparse Representations, Bagging and other Ensemble Methods, Dropout,
Adversarial Training, Tangent Distance, tangent Prop and Manifold, Tangent Classifier
UNIT - V
Optimization for Train Deep Models: Challenges in Neural Network Optimization, Basic Algorithms,
Parameter Initialization Strategies, Algorithms with Adaptive Learning Rates, Approximate Second-
Order Methods, Optimization Strategies and Meta-Algorithms
Applications: Large-Scale Deep Learning, Computer Vision, Speech Recognition, Natural Language
Processing
TEXT BOOKS:
1. Deep Learning: An MIT Press Book By Ian Goodfellow and Yoshua Bengio and Aaron Courville
2. Neural Networks and Learning Machines, Simon Haykin, 3rd Edition, Pearson Prentice Hall.
146
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Course Outcomes:
Ability to apply HCI and principles to interaction design.
Ability to design certain tools for blind or PH people.
UNIT - I
Introduction: Importance of user Interface – definition, importance of good design. Benefits of good
design. A brief history of Screen design.
The graphical user interface – popularity of graphics, the concept of direct manipulation, graphical
system, Characteristics, Web user – Interface popularity, characteristics- Principles of user interface.
UNIT - II
Design process – Human interaction with computers, importance of human characteristics human
consideration, Human interaction speeds, understanding business junctions.
Screen Designing: Design goals – Screen planning and purpose, organizing screen elements, ordering
of screen data and content – screen navigation and flow – Visually pleasing composition – amount of
information – focus and emphasis – presentation information simply and meaningfully – information
retrieval on web – statistical graphics – Technological consideration in interface design.
UNIT - III
Windows – New and Navigation schemes selection of window, selection of devices based and screen-
based controls. Components – text and messages, Icons and increases – Multimedia, colors, uses
problems, choosing colors.
UNIT - IV
HCI in the software process, The software life cycle Usability engineering Iterative design and
prototyping Design Focus: Prototyping in practice Design rationale Design rules Principles to support
usability Standards Golden rules and heuristics HCI patterns Evaluation techniques, Goals of
evaluation, Evaluation through expert analysis, Evaluation through user participation, Choosing an
evaluation method. Universal design, Universal design principles Multi-modal interaction
UNIT - V
Cognitive models Goal and task hierarchies Design Focus: GOMS saves money Linguistic models The
challenge of display-based systems Physical and device models Cognitive architectures Ubiquitous
computing and augmented realities Ubiquitous computing applications research Design Focus: Ambient
147
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Wood – augmenting the physical Virtual and augmented reality Design Focus: Shared experience
Design Focus: Applications of augmented reality Information and data visualization Design Focus:
Getting the size right.
TEXT BOOKS:
1. The essential guide to user interface design, Wilbert O Galitz, Wiley Dream Tech. Units 1, 2, 3
2. Human – Computer Interaction. Alan Dix, Janet Fincay, Gre Goryd, Abowd, Russell Bealg,
Pearson Education Units 4,5
REFERENCE BOOKS:
1. Designing the user interface. 3rd Edition Ben Shneidermann, Pearson Education Asia.
2. Interaction Design Prece, Rogers, Sharps. Wiley Dreamtech.
3. User Interface Design, Soren Lauesen , Pearson Education.
4. Human –Computer Interaction, D. R. Olsen, Cengage Learning.
5. Human –Computer Interaction, Smith - Atakan, Cengage Learning.
148
R18 B.Tech. IT Syllabus JNTU HYDERABAD
Course Outcomes:
Students will understand the usage of computers in forensic, and how to use various forensic
tools for a wide variety of investigations.
It gives an opportunity to students to continue their zeal in research in computer forensics
UNIT - I
Introduction of Cybercrime: Types, The Internet spawns crime, Worms versus viruses, Computers' roles
in crimes, Introduction to digital forensics, Introduction to Incident - Incident Response Methodology –
Steps - Activities in Initial Response, Phase after detection of an incident
UNIT - II
Initial Response and forensic duplication, Initial Response & Volatile Data Collection from Windows
system -Initial Response & Volatile Data Collection from Unix system – Forensic Duplication: Forensic
duplication: Forensic Duplicates as Admissible Evidence, Forensic Duplication Tool Requirements,
Creating a Forensic. Duplicate/Qualified Forensic Duplicate of a Hard Drive
UNIT - III
Forensics analysis and validation: Determining what data to collect and analyze, validating forensic
data, addressing data-hiding techniques, performing remote acquisitions
Network Forensics: Network forensics overview, performing live acquisitions, developing standard
procedures for network forensics, using network tools, examining the honeynet project.
UNIT - IV
Current Forensic tools: evaluating computer forensic tool needs, computer forensics software tools,
computer forensics hardware tools, validating and testing forensics software E-Mail Investigations:
Exploring the role of e-mail in investigation, exploring the roles of the client and server in e-mail,
investigating e-mail crimes and violations, understanding e-mail servers, using specialized e-mail
forensic tools.
Cell phone and mobile device forensics: Understanding mobile device forensics, understanding
acquisition procedures for cell phones and mobile devices.
UNIT - V
Working with Windows and DOS Systems: understanding file systems, exploring Microsoft File
Structures, Examining NTFS disks, Understanding whole disk encryption, windows registry, Microsoft
startup tasks, MS-DOS startup tasks, virtual machines.
TEXT BOOKS:
1. Kevin Mandia, Chris Prosise, “Incident Response and computer forensics”, Tata McGraw Hill,
2006.
149
R18 B.Tech. IT Syllabus JNTU HYDERABAD
2. Computer Forensics, Computer Crime Investigation by John R. Vacca, Firewall Media, New
Delhi.
3. Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart, CENGAGE
Learning
REFERENCE BOOKS:
1. Real Digital Forensics by Keith J. Jones, Richard Bejtiich, Curtis W. Rose, Addison- Wesley
Pearson Education
2. Forensic Compiling, A Tractitioneris Guide by Tony Sammes and Brian Jenkinson, Springer
International edition.
150